| SQL Injection | |
| Arbitrary Code Injection | |
| Buffer Overflow | |
| Improper Resource Shutdown or Release | |
| CVE-2020-35652 | |
| Improper Resource Shutdown or Release | |
| Uncontrolled Recursion | |
| Missing Authorization | |
| Missing Authorization | |
| NULL Pointer Dereference | |
| NULL Pointer Dereference | |
| Out-of-Bounds | |
| NULL Pointer Dereference | |
| Resource Exhaustion | |
| Incorrect Authorization | |
| NULL Pointer Dereference | |
| Information Exposure | |
| CVE-2018-7286 | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Incomplete Cleanup | |
| Out-of-Bounds | |
| Missing Release of Resource after Effective Lifetime | |
| Information Exposure | |
| OS Command Injection | |
| Information Exposure | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Improper Authorization | |
| CVE-2016-2232 | |
| Integer Underflow | |
| Cryptographic Issues | |
| Resource Management Errors | |
| CVE-2014-9374 | |
| Improper Data Handling | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Access Restriction Bypass | |
| Improper Input Validation | |
| Improper Input Validation | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| CVE-2014-4047 | |
| CVE-2014-4046 | |
| Improper Input Validation | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Improper Input Validation | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Information Exposure | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Out-of-Bounds | |
| Access Restriction Bypass | |
| CVE-2012-2186 | |
| Resource Management Errors | |
| Resource Management Errors | |
| Resource Management Errors | |
| Improper Access Control | |
| Out-of-Bounds | |
| Improper Authentication | |
| Out-of-Bounds | |
| CVE-2012-0885 | |
| Information Exposure | |
| Information Exposure | |
| Improper Input Validation | |
| Improper Input Validation | |
| Configuration | |
| Out-of-Bounds | |
| CVE-2011-2665 | |
| Improper Input Validation | |
| Information Exposure | |
| CVE-2011-2216 | |
| Resource Management Errors | |
| Improper Input Validation | |
| CVE-2011-1175 | |
| Resource Management Errors | |
| Out-of-Bounds | |
| Out-of-bounds Write | |
| Access Restriction Bypass | |
| CVE-2010-0685 | |
| Improper Input Validation | |
| CVE-2009-4055 | |
| Information Exposure | |
| CVE-2008-7220 | |
| Out-of-Bounds | |
| Resource Management Errors | |
| Resource Management Errors | |
| Information Exposure | |
| Improper Authentication | |
| Information Exposure | |
| Improper Authentication | |
| Resource Management Errors | |
| Improper Input Validation | |
| Improper Authentication | |
| Configuration | |
| Out-of-Bounds | |
| Credentials Management | |
| Use of Externally-Controlled Format String | |
| Access Restriction Bypass | |
| Resource Management Errors | |
| Improper Authentication | |
| SQL Injection | |
| SQL Injection | |
| Out-of-Bounds | |
| CVE-2007-4455 | |
| CVE-2007-4280 | |
| CVE-2007-4103 | |
| CVE-2007-3762 | |
| CVE-2007-3765 | |
| CVE-2007-3763 | |
| CVE-2007-3764 | |
| CVE-2007-2488 | |
| CVE-2007-2383 | |
| CVE-2007-2293 | |
| CVE-2007-2294 | |
| CVE-2007-2297 | |
| CVE-2007-1595 | |
| CVE-2007-1561 | |
| CVE-2007-1306 | |
| CVE-2006-5445 | |
| CVE-2006-5444 | |
| CVE-2006-4345 | |
| CVE-2006-4346 | |
| Out-of-Bounds | |
| CVE-2006-1827 | |
| CVE-2005-3559 | |
| CVE-2005-2081 | |
| CVE-2003-0779 | |
| CVE-2003-0761 | |